logo
Infobip unveils CXOP: The next generation of AI-powered customer conversations

Infobip unveils CXOP: The next generation of AI-powered customer conversations

Zawya11-06-2025

Global cloud communications platform Infobip today announced its Conversational Experience Orchestration Platform (CXOP) — a game-changing solution that places agentic AI at the heart of every customer interaction. CXOP enables brands to move beyond static, rules-based workflows to deliver dynamic, goal-oriented conversations across marketing, sales, and support — at scale. The announcement builds on Infobip's AI Hub, marking a major step forward by natively infusing agentic AI across Infobip's entire award-winning product stack — unifying channels, data, and automation into a single intelligent platform.
Built on Microsoft Azure OpenAI in Foundry Models, CXOP uses intelligent AI agents to orchestrate personalized customer journeys across channels like WhatsApp, RCS, and web chat. These agents understand context, act autonomously, and seamlessly collaborate with human teams when needed — reducing time to resolution, improving loyalty, and cutting costs.
Today's consumers expect instant, relevant, and seamless interactions no matter what the channel. CXOP meets this demand by unifying messaging, automation, and AI-powered assistance within a single, intelligent platform that adapts to behavior, sentiment, and intent in real time.
With CXOP, businesses can:
Deliver empathetic, goal-driven AI interactions across channels
Slash response times and reduce service costs through automation
Increase lead conversion and campaign performance with real-time personalization
Support hybrid teams with human-in-the-loop for complex cases
Launch fast with no-code or full-code deployment options
At its core, CXOP leverages a network of intelligent, agentic AI assistants that understand user intent and execute context-sensitive workflows. These agents don't just answer — they guide, solve, and act, creating fluid, human-like experiences from lead generation to retention.
'CXOP enables enterprises to move beyond static workflows and deliver intelligent, empathetic interactions at scale,' said Ivan Ostojić, Chief Business Officer at Infobip. 'It's a foundational step toward building AI-first customer experiences that drive measurable business impact.'
'Using agentic AI instead of a rules-based automation, Infobip's new CXOP is an enhancement for customer experiences,' said Myladie Stoumbou, Sr Director ISV Partnerships, at Microsoft. 'Available within the Microsoft Azure Marketplace, clients can access such certified products and eliminate the complexity of managing individual vendor relationships.'
About Infobip
Infobip is a global cloud communications platform that enables businesses to build connected experiences across all stages of the customer journey. Accessed through a single platform, Infobip's omnichannel engagement, identity, user authentication and contact centre solutions help businesses and partners overcome the complexity of consumer communications to grow business and increase loyalty. It offers natively built technology with the capacity to reach over seven billion mobile devices and 'things' in 6 continents connected to over 9,700+ connections of which 800+ are direct operator connections. Infobip was established in 2006 and is led by its co-founders, CEO Silvio Kutić, Roberto Kutić and Izabel Jelenić.
Recent award wins include:
Infobip ranked as Leader in the Omdia CPaaS Universe Report for the third time (April 2025)
Infobip ranked an Established Leader in the Juniper Research Conversational AI Leaderboard (Feb 2025)
Infobip named a CPaaS Leader for the third time in the IDC MarketScape (Feb 2025)
Infobip named one of the top CPaaS providers in Metrigy's CPaaS MetriRank Report (Dec 2024)
Infobip named number one among Established Leaders in RCS Business Messaging in Juniper Research's RCS Business Messaging Competitor Leaderboard 2024 (Nov 2024)
Infobip recognized as the number one provider in the AIT Fraud Prevention market by Juniper Research (Oct 2024)
Infobip named a Leader in the Gartner® Magic Quadrant™ for Communications Platform as a Service (CPaaS) 2024 for the second year running (June 2024)
Infobip named to Fast Company's Annual List of the World's Most Innovative Companies (March 2024)

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

The anatomy of a crypto scam: How to stop and prevent common threats
The anatomy of a crypto scam: How to stop and prevent common threats

Crypto Insight

time11 hours ago

  • Crypto Insight

The anatomy of a crypto scam: How to stop and prevent common threats

In the vast world of crypto, the line between opportunity and deception is razor-thin. The traits that make digital assets attractive — anonymity, independence and rapid transferability — also create fertile ground for fraudsters. Scams are woven into the fabric of the crypto ecosystem, exploiting trust, greed and fear. Unlike traditional financial systems with regulators, the decentralized crypto space allows opportunistic actors to thrive. Understanding the structure of these scams is crucial. Just as forensic investigators dissect crime scenes, analyzing the architecture of crypto scams reveals the calculated maneuvers used to siphon funds. Each scam follows a familiar blueprint — preying on human psychology and the lack of regulation in decentralized finance (DeFi). Breaking down these frameworks provides valuable insights, helping investors and institutions recognize warning signs and fortify defenses in this high-risk environment. The hook — perfect bait for every target The first stage of any scam begins with the hook: a carefully crafted message or offer designed to capture the victim's attention and trigger an emotional response. Before setting the hook, scammers often invest significant time gathering information about their targets. They sift through leaked emails, phone numbers and other personal information to build a profile, crafting a personalized scam to increase the likelihood of success. By incorporating specific details — such as the target's language or personal information — the fraudsters add a layer of credibility that creates trust. Once armed with their target's details, scammers move to the hook, preying on curiosity, trust and the promise of easy profits. Whether it's a phishing email, a fake account alert or an investment opportunity promising 'guaranteed returns,' the goal is to present something too enticing to ignore. A common example is the fake exchange account scam, in which victims believe they have been given accidental access to a large sum of unclaimed money. The scam begins with an unexpected message stating, 'Your account has been created,' accompanied by login credentials for an account/wallet on a cryptocurrency exchange. The victim logs in and finds a balance of $10,000 waiting for them. Delight is replaced by greed as they attempt to withdraw the funds. But there's a catch: the system requires a small deposit — perhaps $1,000 — to unlock the full amount. Once the fee is paid, the scam becomes clear: the exchange was fake, and the deposit is now in the hands of scammers. This scam works because it preys on greed and the allure of a 'lucky break.' Victims become so focused on the reward that they ignore the warning signs, such as bad grammar in the message or lack of domain security on the website. The setup — establishing trust and gaining access After successfully hooking a victim's attention, scammers focus on building trust. This phase involves cultivating a sense of legitimacy and familiarity with scammersgoing to great lengths to establish a personal connection. Scammers may even employ tactics like investment scams, where they spend weeks or months grooming their victims, engaging them in friendly conversations and feigned relationships to create a strong bond. Only once this trust is deeply established do they introduce the fraudulent investment or fake platform, luring victims to transfer funds that they will never see again. The SIM swap attack is another devastating example whereby scammers exploit technological trust. By gathering personal information that is available publicly on social media, such as birthdays, pet names or even favorite sports teams, the fraudster can impersonate the victim. They then contact the target's mobile service provider, armed with these personal details, and request a phone number transfer to a SIM card in their possession. With control over the victim's phone number, they can bypass two-factor authentication and gain access to crypto wallets, bank accounts and emails. The setup phase succeeds because scammers exploit both technological trust and personal familiarity. Humans are, by nature, social creatures, and scammers exploit this characteristic by building relationships that appear genuine. In the SIM swap, scammers manipulate trust in technology, using the victim's digital security habits against them. The execution — draining funds through hidden mechanisms Once access is gained, scammers move to the execution phase, where they drain funds using hidden mechanisms. This is the most devastating stage, as the carefully designed setup ends in significant financial losses for the victim before they've even realized something is wrong. For example, in 2018, a victim boarded a short flight, unaware that scammers had executed a SIM swap while he was offline. By the time the plane landed, funds had been siphoned from his crypto wallet. With control over his phone number, the scammers were able to bypass two-factor authentication (2FA) and gain access to everything. Another good example is the poison wallet tactic which targets large over-the-counter (OTC) platforms. Scammers trick targets into sending small amounts of funds to fraudulent addresses. They do this by creating wallet addresses that look very similar to the initial and final characters of the victim's legitimate address. They then send a small transaction to the victim, hoping the fake address will show up in the user's transaction history. When the victim next makes a transaction, they may unwittingly select the fake address from their history. In this tactic, scammers take advantage of automation and human error. Bots monitor wallet balances, triggering automatic withdrawals when a balance crosses a certain threshold. Meanwhile, the use of familiar-looking addresses plays on the victim's carelessness and trust in their own records. The stolen amounts might be small per transaction, but cumulatively, they siphon off thousands daily, all going virtually unnoticed.

Cybercriminals gain access as 16 billion credentials exposed in historic data breach
Cybercriminals gain access as 16 billion credentials exposed in historic data breach

Tahawul Tech

timea day ago

  • Tahawul Tech

Cybercriminals gain access as 16 billion credentials exposed in historic data breach

The threat landscape continues to evolve, and the message from cybersecurity experts is clear: digital vigilance and routine cyber hygiene are now non-negotiable. The global cybersecurity community is sounding the alarm following what Cybernews has dubbed the largest data breach in history, revealing a staggering 16 billion login credentials scattered across 30 different databases. While some records are believed to overlap, researchers emphasise that much of the data stems from recent infostealer malware attacks, not just recycled incidents from the past. This latest revelation significantly raises the stakes in the ongoing battle against credential theft. Commenting on the report, Alexandra Fedosimova, Digital Footprint Analyst at Kaspersky, explains: '16 billion records is a figure nearly double the Earth's population, and it's hard to believe such a vast amount of information could be exposed. This 'leak' refers to a compilation of 30 user data breaches from various sources. These data sets ('logs') are primarily obtained by cybercriminals through infostealers — malicious applications that steal information — and such incidents occur daily. Cybernews researchers collected this data over six months from the start of the year. Their dataset likely contains duplicates due to the persistent issue of password reuse among users. Therefore, although it was noted that none of the databases they found had been previously reported, this doesn't mean these credentials hadn't previously leaked from other services or been collected by other infostealers.' Kaspersky telemetry further supports the scale of the threat, reporting a 21% global increase in password stealer detections from 2023 to 2024. Infostealer malware has emerged as one of the most pervasive cyber threats, compromising millions of devices and extracting credentials, cookies, and sensitive data — all of which are then aggregated and circulated on the dark web. Dmitry Galov, Head of Kaspersky's Global Research and Analysis Team (GReAT) for Russia and CIS, added: 'Cybernews research speaks of an aggregation of several data leaks over a long period – since the start of the year. This is a reflection of a thriving cybercrime economy that has industrialised credential theft. 'Credentials are harvested, enriched, and resold — often multiple times — via combo lists that are constantly updated and even made available on public platforms.' 'What's notable here is that the datasets were reportedly temporarily exposed via unsecured channels, making them accessible to anyone who stumbled upon them.' Anna Larkina, Web Content Analysis Expert at Kaspersky, advises users to take urgent action and said, 'This news is a good reminder to focus on digital hygiene. Regularly update your passwords, enable two-factor authentication, and use a reliable password manager, such as Kaspersky Password Manager, to store your credentials securely. If you suspect your accounts may have been compromised, contact support services immediately to regain access and limit further damage. Users should also stay alert to social engineering scams that exploit leaked data.' Adding to the expert views, Peter Mackenzie, Director of Incident Response and Readiness at Sophos, said, 'While you'd be right to be startled at the huge volume of data exposed in this leak, it's important to note there is no new threat here — this data will most likely already have been in circulation. These datasets are amalgamated from multiple breaches. What this tells us is the sheer depth of information now available to cybercriminals. It's a powerful reminder to everyone to take proactive steps — update passwords, use a password manager, and implement multifactor authentication. If concerned, check your email at to see if your data has been compromised.'

AI is all about doing more with less and opens the door to new possibilities
AI is all about doing more with less and opens the door to new possibilities

Zawya

timea day ago

  • Zawya

AI is all about doing more with less and opens the door to new possibilities

In 2025 and the second half of this decade, artificial intelligence (AI) will become a defining measure of South African businesses' success. Today, the technology touches every corner of the modern enterprise, from sales and marketing to administration and finance. According to a survey conducted by Ipsos for Google, AI usage is up in South Africa compared to 2024, with excitement about its potential now outweighing concern. Over half of the surveyed South Africans report they've used generative AI (GenAI) in the last year. Author: Werner Joubert, commercial SYS director (South Africa & SADC) at Asus This level of adoption reflects the impact of AI not only in large multinational enterprises, but also in small-to-medium businesses, fledgling entrepreneurs and lone professionals who see the technology's potential at any scale. Technology vendors have responded to this by creating an ecosystem of systems and solutions that help businesses leverage AI to unlock new value. With the right strategic implementation, enterprises can turn potential into performance. AI at any scale for any business So, how is AI all about doing more with less? At its core, AI is an exercise in automation. It eliminates the need for employees and professionals to carry out manual, repetitive and time-consuming tasks. Some of the most common AI uses in the enterprise today, regardless of the size or scale, include: - Schedule optimisation: Companies can use AI tools to optimise scheduling by consolidating factors such as employee availability, skills, preferences and customer traffic. For example, a business like a coffee shop can determine who and how many employees they need available to meet demand levels throughout the day. - Customer service: Chatbots and other conversational AI tools can provide business customers with additional support and serve as a dedicated portal for addressing queries. - Finance: GenAI platforms, backed by large language models (LLMs) that specialise in accounting, cash flow and taxes, can help employees process transactions and invoices more quickly, while also reducing the potential for data entry errors. - Personalisation and content creation: Every business has the potential to be unique. Using GenAI tools to create tailor-made content and promotional material, businesses can put their stamp on the landscape while offering high levels of customisation based on customer preferences, behaviours and market trends. From there, the potential applications of AI expand to cover all enterprise functions, across every industry vertical, from education to healthcare. As a business driver, AI has proven to be incredibly versatile and scalable, with businesses integrating it into their organisations in whatever way, shape or form they see fit. They're able to do that with the help of state-of-the-art hardware and digital resources that make AI accessible like never before. The right kind of tech? For many businesses in South Africa, AI adoption does not involve investing large sums of money in training their own models or running expansive cloud computing environments. Not every enterprise requires the same level of digital infrastructure to run and evolve. For many, the value of AI lies in simple integrations and the use of cutting-edge products that are readily available. We see this with the likes of Gemini and Midjourney, but the AI revolution has also given rise to innovative platforms and services that blend seamlessly and are work with existing enterprise hardware. One such example is Copilot, an AI-powered chat service from Microsoft that generates content and automates tasks, while also supporting users of other Microsoft technologies such as Windows, Microsoft 365 and GitHub. It is accessible via web browsers on multiple operating systems, including Windows and macOS, and is also integrated into tools like Windows and Microsoft 365. It offers general AI assistant capabilities that can help enterprise users significantly improve and enhance their workflows. Through services such as Copilot, technology vendors have begun to refine their value offerings and provide customers with solutions that are designed, built and optimised for AI in the enterprise. Laptops are now available with dedicated AI chips and OEM platforms and applications that further empower businesses and professionals. This is AI made accessible, and it has the power to transform enterprises of all shapes and sizes. AI is how we do more with less. It's also how we do more with what we have. By evaluating the value proposition of AI features and understanding the gains they offer, enterprises can not only make their organisations more intelligent, but also help employees and professionals get the most out of their hardware, adopt the latest practices and take their ideas and businesses into the future.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store